Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 13, 2023 5:56:54 GMT
Well, since this forum has been all but abandoned again, I guess that gives me free reign to do whatever the hell I want. Let's talk about something interesting for a change. Something useful:
Never be silenced again and take power back into your own hands. Enter the power of cryptography!
The Government can't shut you up! Your boss can't tell you what to say! Anal retentive mods on Discord and online message boards can't tape your mouth shut!
To be honest, I am not a cryptography pro, but I have a few useful tricks up my sleeve. That's why I am starting this thread, so that those who are interested in learning more about this ancient skill can join me on a journey where we learn and explore together!
What will we be doing on this journey?
Learning different methods and tools for encrypting messages.
Using these tools to troll highly moderated and censored message boards. Send messages that are hidden in plain sight! Have fun together.
Feel free to contribute by sharing our own useful cryptography knowledge!
Watch this space!
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 13, 2023 6:36:10 GMT
Okay, so before I start sharing some cryptography tutorials I wanted to break the ice by proving the effectiveness of cryptography in bypassing censorship. What better way to do this than by breaking the terms of service of ProBoards without them even knowing! This image contains a hidden message. It's one of the Internet's most censored videos of all time. The daring work of art is an allegory for the concept of spiritual awakening. It examines the prevalent ideologies that are internalized in our culture, and in true post-modern form; the thematic piece tends to raise more questions than answers.
To find the hidden Content:
1. Download the image 2. Right click on the downloaded file and select "open with" 3. select "Notepad" 4. Scroll down until you find the link to the censored media.
This is just one of the many ways in which we can undermine and circumvent the authoritative measures of others. There are actually more steps to encrypt this message with multiple layers, but I wanted to keep it basic for the demonstration. All of us will learn a lot more as we progress on this journey.
If you were able to find the hidden message, reply to this thread with "Ha Ha very funny!"
If you were able to find the hidden message, and now you're offended, well, don't be a prude lol! It's all harmless fun!
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 13, 2023 19:48:57 GMT
Okay, it's time for a tutorial. Cryptography lesson 1! This is exciting guys.
So the first method of encryption that we are going to learn today is a very basic one. You've probably learned about it in primary school or high school. It's called the Caesar Cipher. This is a very easy way to write hidden messages, especially for beginners.
It's a substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet. Here's a step-by-step guide: Caesar Cipher:
Choose a Shift Value (Key): Decide on a number to shift the letters. This is your key. For example, a shift of 3 means that 'A' becomes 'D,' 'B' becomes 'E,' and so on.
Write Your Message: Start with your plaintext message, the message you want to encrypt.
Shift the Letters: Replace each letter in your message with the letter that is a fixed number of positions down or up the alphabet. For example, with a shift of 3: Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC
Encrypt Your Message: Replace each letter in your message with the corresponding shifted letter. Leave non-alphabetic characters (like spaces or punctuation) unchanged. Example: "HELLO" with a shift of 3 becomes "KHOOR."
Decrypting: If you want to share the hidden message, the recipient needs to know the shift value. They can then shift the letters back to reveal the original message.
Example:
Let's use a shift of 3 with the message "HELLO."
Plain: H E L L O Cipher: K H O O R
So, "HELLO" becomes "KHOOR" when encrypted with a Caesar Cipher and a shift of 3.
Although this is a fun and basic way to encrypt messages, it's not very secure. Your code can easily be cracked with method's such as brute force or frequency analysis. Basically, if someone is patient enough to cycle through every one of the 25 shift value keys (start with a different letter of the alphabet), they will eventually find the one needed to decipher your message.
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 13, 2023 20:02:49 GMT
Shift key -7 (A-->h) P zbyl sprl ohunpun vba vu ywj klihal mvybt! Olyl pz h tlzzhnl aoha P ohcl lujyfwalk dpao aol Jhlzhy Jpwoly! Dvd ylhssf jvvsk pa p bzlk h zopma rlf vm zlclu!
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 14, 2023 6:58:07 GMT
Okay, so before I start sharing some cryptography tutorials I wanted to break the ice by proving the effectiveness of cryptography in bypassing censorship. What better way to do this than by breaking the terms of service of ProBoards without them even knowing! This image contains a hidden message. It's one of the Internet's most censored videos of all time. The daring work of art is an allegory for the concept of spiritual awakening. It examines the prevalent ideologies that are internalized in our culture, and in true post-modern form; the thematic piece tends to raise more questions than answers.
To find the hidden Content:
1. Download the image 2. Right click on the downloaded file and select "open with" 3. select "Notepad" 4. Scroll down until you find the link to the censored media.
This is just one of the many ways in which we can undermine and circumvent the authoritative measures of others. There are actually more steps to encrypt this message with multiple layers, but I wanted to keep it basic for the demonstration. All of us will learn a lot more as we progress on this journey.
If you were able to find the hidden message, reply to this thread with "Ha Ha very funny!"
If you were able to find the hidden message, and now you're offended, well, don't be a prude lol! It's all harmless fun!
Ok, so remember that I said there was a way to add another layer of encryption to this image. Well, you can encrypt the hidden message using the Caesar Cipher (Shift key Cipher). But is it really necessary? Well it depends who you are sending the message to. Most people are too lazy to learn about cryptography, and the chances are that most people (especially moderators) will just think it's a normal image and go about their day without questioning anything.
Enter Cryptography lesson 2!
So what do you do if you want to encrypt a message with a subsibut you need something more reliable than the shift key cipher? Well, that is where the Alphabet Cipher a.k.a the Key word cipher.
Here's how it works:
Pick a Secret Word: You and your friend decide on a special word that only you two know. Let's say your secret word is "FRIEND."
Make a Key: Write down the letters of the alphabet, one below the other. Under each letter, write the corresponding letter from your secret word. Like this:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z F R I E N D F R I E N D F R I E N D F R I E N D F R I E N D
So, 'F' in your secret word corresponds to 'A,' 'R' corresponds to 'B,' 'I' to 'C,' and so on.
Write in Code: When you want to write a secret message, use the letters from the bottom row (your secret word row) instead of the regular alphabet. So, if you want to write "HELLO," you would use the letters from your key:
mathematica
H -> C E -> N L -> I L -> I O -> D
The secret message would be "CNIID."
Decode the Message: Your friend, who knows the secret word, can use the same key to turn "CNIID" back into "HELLO."
There is also another method for using the key word cipher:
A keyword serves as the key, determining the letter associations between the cipher alphabet and the plain alphabet. Any repeated letters in the keyword are omitted. Subsequently, the cipher alphabet is constructed with the keyword aligning with A, B, C, and so forth, until the keyword is exhausted. Following this, the remaining ciphertext letters are arranged in alphabetical order, excluding those already used in the keyword.
Encryption Procedure:
Input the desired keyword in the first line. Input the string to be encrypted in the second line.
Plain Alphabet: a b c d e f g h i j k l m n o p q r s t u v w x y z Encrypted Alphabet: f r i e n d s a b c g h j k l m o p q t u v w x y z
For example, with "friends" as the keyword, every occurrence of 'A' is replaced with 'K,' 'B' with 'R,' and so forth. Encrypting the message "knowledge is power" using the keyword "friends":
gklwhnesn bq mlwnp
So is this cipher immune to attack?
Well, the key word cipher is much stronger than the Caesar Cipher, and although it's much more secure, there are still ways to attack it. The best ways to attack a keyword cipher without knowing the keyword are through the known-plaintext attack, frequency analysis, and discovery of the keyword (torture is a good way of extracting it). Keyword discovery allows immediate decryption since the table can be made immediately.
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 14, 2023 13:56:25 GMT
Cryptography Lesson 3! So here is another fun way to do things. It's called the Symbol Substitution method. Instead of using a Shift key or a Key word, you can substitute the letters of the alphabet with a picture or Uni-code symbol. This is great for sending secret messages on a message board or social media platform. Especially when you use a bunch of positive emoji's (Then the forum mods think you are supportive lol).
π₯° π π π β€ π π β€ π₯ π π βΊ π π₯³ πΉ β π π π π« π€ π π π― π π A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Example:
Secret Message:
Hey everyone! So glad to be here on Facebook! What a terrific place!
ππ₯°πβ€ππΉπΉπ ππΉππ ππ€ππ ππΉπ€ π₯°πβ€ π₯°βΊβΊ π₯° ππ€π₯³πβ€ πΉπ βΊπΉπβ€ππ
Deciphered:
Hey everyone! So glad to be here on Facebook! What a terrific place! Facebook mods suck you are all a bunch of losers
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 15, 2023 5:08:32 GMT
If you want some solid lolz, decipher this!
Shift key 10 (a-->k)
Gri dbyvv Jyvk kxn D4C wocckqo lykbnc? Okci Jyvk sc dro vyv myg drkd tecd uoozc yx qsfsxq!
Govv, drbyeqr k vsddvo cymskv oxqsxoobsxq, S gkc klvo dy zkcc dro pybew'c nopoxmoc kxn boqscdob kx kmmyexd exnob k pkuo kfkdkb (Wyxsaeo). Xyg dro pex loqsxc! Iye coo, moxcybsxq dro pybew rkcx'd kmdekvvi nyxo kxidrsxq dy nodob kxiyxo pbyw dbyvvsxq kxn wkusxq k wymuobi yp Jyvk kxn dro D4C. Sd'c yxvi cdspvon dro qbygdr yp dro D4C mywwexsdi, lomkeco xog wowlobc rkfo dy tewz drbyeqr vsdobkv ryyzc tecd dy qod kx kmmyexd.
Led drkd'c tecd sd. Sd gkc xofob klyed dro dbyvvsxq, gkc sd? Dbyvvsxq gkc tecd kx ohmeco dy myfob ez Jyvk'c bokv sxdoxdsyxc. Cro sc k mevd voknob kxn cro gkxdc zoyzvo dy vsddobkvvi vsmu dro crsd yed yp rob kccryvo lopybo droi kbo kvvygon dy zycd. Cro gkxdc dy lo gybcrszon, tecd vsuo Wkhsxo pbyw dro Tyi yp Ckdkx. Cro nyocx'd bokvvi mkbo klyed Ckdkxscw. Cro tecd mkboc klyed qod cywo zbksco kxn knybkdsyx pbyw k pog vyikv pyvvygobc.
Jyvk sc kvcy vkji. Cro sc zobpomdvi myxdoxd dy csd lkmu kxn gkdmr ydrobc ny dro gybu. Csxmo S vopd dro wsxscdbi, cro rkcx'd nyxo kxidrsxq dy nofovyz dro golcsdo. Govv, xyg go kbo qysxq dy rkfo cywo pex kxn coo ryg wkxi vyvj drsc vyv myg rkc vopd dy qsfo! Drsc sc qysxq dy lo pex. Kxn nyx'd qod wo gbyxq, S nyx'd rkfo kxidrsxq kqksxcd Jyvk. Sd'c tecd pex dy dkuo dro zscc yed yp zoyzvo gry kbo dyy cobsyec klyed vspo. Go kbo qysxq dy ohzvysd wkxi ydrob pybewc kxn cymskv wonsk zvkdpybwc yx yeb tyebxoi!
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 15, 2023 6:28:37 GMT
Welp, that didn't last very long. Maybe that old lol cow really is dead after all. RIP, I think that platform has been ran into the ground from all the trolling... now it's impossible for new members to make accounts. Can't stop LMAO at this. Was this censorship? I didn't even say anything that could be censored.. The platform was probably obliterated from years of trolling. Or maybe I just have too much of a reputation there.
No sense in flogging a dead horse I guess... What's the sense in trolling a place that has virtually only 3 active account?
So who am I going to troll now? Am open to suggestions.
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 15, 2023 6:30:51 GMT
Actually I just thought of the perfect Place! This is going to be fun. Stay tuned for updates.
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 15, 2023 6:57:10 GMT
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 15, 2023 8:58:47 GMT
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 15, 2023 9:52:06 GMT
Ok, that backfired a little. BALG seems to have an antivirus security measure on their forum that added another layer of encryption to the image when I uploaded it. Not sure how to decipher it once uploaded. I know there must be a way, just have to figure out how. I tried converting to netpmb, but it didn't work. Will keep you posted on my progress.
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 17, 2023 4:55:59 GMT
Now that you saw some working examples of how to defeat censorship using cryptography, it's time for:
Cryptography lesson 4:
The affine cipher is a type of monoalphabetic substitution cipher, where each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter. In the case of the affine cipher, the encryption function is of the form E(x)=(ax+b)modββmE(x)=(ax+b)modm, where:
xx is the numeric value of the plaintext letter, aa and bb are the key parameters, mm is the size of the alphabet.
The values of aa and bb must be chosen such that aa and mm are coprime (they have no common factors other than 1), ensuring that the encryption and decryption processes are reversible.
The decryption function is of the form D(y)=aβ1(yβb)modββmD(y)=aβ1(yβb)modm, where aβ1aβ1 is the modular multiplicative inverse of aa modulo mm. It's important to note that aβ1aβ1 exists only if aa and mm are coprime.
Here's a step-by-step explanation of the encryption and decryption processes: Encryption:
Assign numeric values to the letters: Convert each letter of the plaintext to its numeric equivalent, typically using the position in the alphabet (e.g., A=0, B=1, ..., Z=25).
Apply the encryption function: For each numeric value xx, compute E(x)=(ax+b)modββmE(x)=(ax+b)modm to get the ciphertext numeric value.
Convert back to letters: Convert the numeric values obtained in step 2 back to letters using the reverse of the mapping used in step 1.
Decryption:
Assign numeric values to the letters: Convert each letter of the ciphertext to its numeric equivalent.
Calculate the modular multiplicative inverse: Calculate the modular multiplicative inverse aβ1aβ1 of the key aa modulo mm. This step is possible only if aa and mm are coprime.
Apply the decryption function: For each numeric value yy, compute D(y)=aβ1(yβb)modββmD(y)=aβ1(yβb)modm to get the plaintext numeric value.
Convert back to letters: Convert the numeric values obtained in step 3 back to letters using the reverse of the mapping used in the encryption process.
The affine cipher provides a way to encrypt and decrypt messages using a relatively simple mathematical formula, but its security is limited compared to more complex ciphers. The key parameters aa and bb play a crucial role in determining the strength of the cipher, and an inappropriate choice can lead to vulnerabilities.
|
|
Druan
Senior Member
Posts: 409
|
Post by Druan on Nov 17, 2023 5:06:11 GMT
Here is the message I encrypted with the affine cypher:
A-63 B-40
Epyff nolybc rab wypn ktsxpmctoxns? Qg pmm
|
|